All WMI objects are queried using…the WMI query language, WQL,…which is similar to SQL.…There are two types of WMI objects;…dynamic and persistent.…Dynamic objects are generated on the fly…when a specific query is performed.…For example, Win32 process objects…are generated on the fly.…Persistent objects are stored…in the CIM repository located by default…in the System 32 Windows directory…under wbemrepositoryobjects.data.…

The Windows management instrumentation service…is automatically started by default in Windows…and can be used to enumerate the Windows configuration.…

Resume Transcript Auto-Scroll

Author

Released

8/18/2016

Ethical hacking is one of the most desired stills for any IT security professional. White hat hackers can detect, prevent, and mitigate network intrusions and data theft: a critical liability for any company that does business online or in the cloud. This course introduces to the concept of enumeration—identifying the resources on a host or network, including user names, ports and services, policies, and more. It covers protocol, process, and service enumeration on Windows and Linux, and maps to the Enumeration competency from the Certified Ethical Hacker (CEH) body of knowledge. Malcolm discusses host profiling, enumerating protocols (such as SMB, RPC, and SNMP), and enumerating the Internet, and concludes with demos of third-party tools organizations can use to mitigate risk, including SuperScan, NetScan Pro, and JXplorer.